Re: [Coverity] Untrusted user data in kernel

From: Bill Davidsen
Date: Fri Dec 17 2004 - 13:40:35 EST


linux-os wrote:
On Fri, 17 Dec 2004, Bill Davidsen wrote:

James Morris wrote:

On Fri, 17 Dec 2004, Patrick McHardy wrote:


James Morris wrote:


This at least needs CAP_NET_ADMIN.


It is already checked in do_ip6t_set_ctl(). Otherwise anyone could
replace iptables rules :)



That's what I meant, you need the capability to do anything bad :-)


Are you saying that processes with capability don't make mistakes? This isn't a bug related to untrusted users doing privileged operations, it's a case of using unchecked user data.


But isn't there always the possibility of "unchecked user data"?
I can, as root, do `cp /dev/zero /dev/mem` and have the most
spectacular crask you've evet seen. I can even make my file-
systems unrecoverable.

But that's not the type of thing you would do by accident. The kernel can't protect against deliberate abuse by trusted users, nor should it. But the type of problem caused by an application program bug can, and I believe should, be caught.

The difference between "oops" and "take that!"

--
-bill davidsen (davidsen@xxxxxxx)
"The secret to procrastination is to put things off until the
last possible moment - but no longer" -me
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/